|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2014 | Vol. 69 No.2 |
Title: |
DESIGN OF EFFICIENT CACHING ALGORITHMS FOR PEER TO PEER NETWORKS TO REDUCE
TRAFFIC IN INTERNET |
Author: |
S.SIVAKUMAR, Dr.S.ANBU |
Abstract: |
Peer-to-peer (P2P) file sharing systems generate a major portion of the Internet
traffic, and this portion is expected to increase in the future. We explore the
potential of deploying proxy caches in different autonomous systems with the
goal of reducing the cost incurred by Internet service providers and alleviating
the load on the Internet backbone. P2P traffic is more complex than caching
other internet traffic and needs several new algorithms and storage systems. The
paper presents the design and evaluation of a entire, running, proxy cache for
P2P traffic, referred to as PrCache. PrCache transparently intercepts and serves
traffic from different P2P systems. A replacement storage system is projected
and enforced in PrCache. Storage system is optimized for storing P2P traffic,
and shown to outperform other storage systems. A new algorithm to infer the
information required to store and serve P2P traffic by the cache is proposed.
Extensive experiments to evaluate all aspects of PrCache using actual
implementation and real P2P traffic are presented. Based on the analysis,
proposed a new algorithm, called Optimized Least Grade Replacement (OLGR), takes
recency, frequency, perfect-history, and document size under consideration for
Web cache optimization. |
Keywords: |
Caching, LRU,LFU,Traffic,P2P,Network,Security |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPACT OF NODE MOVEMENT USING DYMO PROTOCOLIN DIFFERENT LANDSCAPE TITLE |
Author: |
A. BOOMARANIMALANY RM. CHANDRASEKARAN |
Abstract: |
Manet is an anthology of mobile nodes with moving sense and can communicate to
each other with wireless links without any infrastructure or centralized
administration. Manet has to face many challenges in various aspects; one of the
further most challenges is terrain size and node placement. In this paper some
of the node placement types are analyzed and evaluated their performance. The
results are most useful for choosing simulation environment for their particular
research and applications which was based on performance of mobile ad-hoc
networks |
Keywords: |
Mobile ad-hoc networks, node placement, scalability, DYMO, QOS |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
POWER FACTOR IMPROVEMENT IN SINGLE PHASE DC MOTOR DRIVE USING DOUBLE SIDED PWM
SWITCHING |
Author: |
P.KARPAGAVALLI , Dr. A. EBENEZER JEYAKUMAR |
Abstract: |
This paper presents power factor correction by interleaved dual boost converter
fed DC Motor through full bridge DC-DC converter with unipolar voltage switching
technique. The proposed topologies are designed to achieve unity power factor
with average current mode controller PID based double sided PWM switching(DSPWMS)
and it is a simple and effective manner which creates reduced total harmonic
distortion in AC input line current. Simulation results with dual boost
converter there is shows an improvement in power factor and THD and also
improvement in DC motor performance .The entire system simulation work is
carried out using MATLAB/SIMULINK environment . |
Keywords: |
Interleaved Dual Boost Converter, PID Controller, Average Current Mode Control,
Double Sided PWM Latched Switching, THD. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
THE IMPACT OF INFORMATION ON JOB OUTCOMES |
Author: |
A.HAMEED, IZZELDIN I.MOHD, ALI OUDAH |
Abstract: |
This article examines the effects of two Information and Communication
Technology (ICT) related factors, ICT utilization and perceived ease of ICT
usage, on two job outcomes, job satisfaction and work effectiveness. On a
theoretical basis, the author proposed that these effects could be mediated by
knowledge sharing. A total of 246 usable responses from full-time employees
working in Iraq were analyzed using hierarchical regression analyses, which were
furthered confirmed by Sobel test and bootstrap-based PROCESS analysis. Results
showed that both job satisfaction and work effectiveness were positively related
to ICT utilization and perceived ease of ICT usage. Employees’ knowledge sharing
orientation significantly mediated the relationships of job satisfaction with
ICT utilization and ease of ICT usage, as well as the relationships of work
effectiveness with these two factors. The present study provides further
understanding of the mechanism underlying the influences of ICT on employee
workplace issues. |
Keywords: |
Knowledge Sharing, Job Satisfaction, Work Effectiveness, Mediator |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
MULTIOBJECTIVE BUILT IN SELF REPAIR ALGORITHM WITH MULTIPLE FAULT DETECTION FOR
RECONFIGURABLE SYSTEMS |
Author: |
PRADEEP C, R. RADHAKRISHNAN, NEENA BABY, PHILIP SAMUEL |
Abstract: |
Field Programmable Gate Arrays (FPGAs) are widely used in reliability-critical
applications due to their reconfiguration ability. The emergence of partial
reconfiguration in FPGAs has made it possible to incorporate fault tolerance
into systems more easily. Fault tolerance includes fault detection and fault
recovery. This paper presents the investigation of a fault detection and repair
algorithm. Currently available self-repair algorithm makes use of large number
of spare cells to achieve good fault coverage.This limitation is overcomed by
the proposed algorithm, MORe which satisfies multiple objectives such as less
area, minimum routing overhead and multiple fault detection capability.The MORe
algorithm is demonstrated and compared with the other two existing algorithms
using Matlab. |
Keywords: |
Field Programmable Gate Arrays (FPGAs), Fault Recovery, Self-repair, Transient
fault, Permanent fault, Spare cell. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
QOS BASED HYBRID SWARM INTELLIGENT INTRUSION DETECTION SYSTEM FOR NETWORK
SECURITY |
Author: |
E.BHARATHI1 Dr.A.MARIMUTHU |
Abstract: |
Intrusion detection system plays a vital role in system security which operates
data in real time that may leads to dimensionality problem. As the number and
size of the Network and Internet traffic increase and the need for the intrusion
detection grows in step to reduce the overhead required for the intrusion
detection and diagnosis, it has made public servers increasingly vulnerable to
unauthorized accesses and incursion of intrusions. However, detecting the new
type of attacks on a network system is a very difficult problem from the
perspective of the classification mechanism of IDS. This research work presents
swarm intelligence based approach for IDS to solve the QoS multicast routing
problem of the entire network. In this paper, the Artificial Bee Colony
operators are integrated with Genetic Algorithm (GA) where the employed Bees,
Onlooker Bees and Scout Bees are there to improve the solution space named as
Artificial Bee Genetic Colony Algorithm (ABGCA). Whereas Genetic algorithms
belong to evolutionary algorithms, which produce solutions to optimization
problems by means of approaches motivated by natural evolution. Artificial Bee
Colony (ABC) is an algorithm derived from the intelligent actions of honey bee
swarm. In the proposed approach, the operators of ABC are integrated with GA for
local search strategy. In order to improve the overall performance of the
system, hybrid swarm intelligence techniques can be used in IDS. The simulation
results show that this algorithm has fast convergence and it improves the
network security of the system. |
Keywords: |
Quality of Service; Intrusion detection system; Multicast routing; Artificial
bee colony; Genetic Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
INTELLIGENT PREDICTION AND PREVENTION OF VEHICLE ROLLOVER USING FLQG REGULATOR |
Author: |
BINDA.M.B, DR.M.RAJARAM |
Abstract: |
In this paper, we present a novel methodology for predicting and prevention of
vehicle rollover model and control strategies which is suitable for preventing
the untripped rollovers that was to be caused in vehicle. For vehicles that are
deemed to be susceptible to wheel-lift off, various control strategies are
implemented by earlier researchers. In this work, we propose a method for
rollover prediction and prevention based on the combination of fuzzy logic with
Gaussian controller which does not require such accurate contact information.
The validity of the proposed methodology is proved, and it is used to realize
rollover prediction and prevention in the direction of the roll. The primary
assumption in this implementation is that the vehicle is equipped with a
conventional fuzzy based controller system. |
Keywords: |
Rollover, Ga Tuned Pid Controller, Pid Controller |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT CLUSTERING PROTOCOL FOR COLLECTING DATA IN WIRELESS SENSOR
NETWORK |
Author: |
L.SUJIHELEN, C. JAYAKUMAR |
Abstract: |
Wireless Sensor Network (WSN) is used for collecting the information from the
environment. WSN consists of a large number of Sensor Nodes (SN). Each Sensor
Nodes in the network are connected by a wireless Channels. All the real time
applications of Wireless Sensor Network (WSN) need energy. The nodes in the
Wireless sensor networks are battery driven. There are some techniques such as
clustering and data aggregation is used for energy efficiency. In the existing
Energy Efficient Clustering to Enhanced Lifetime (EECPL) protocol, the reduction
in the energy consumption is accomplished by performing data aggregation in the
Cluster Members rather than Cluster Heads. Further, ring topology is adopted, in
order to enable load balancing in the network. However, it is observed that the
delay involved in data transmission is increased which makes it unsuitable for
real-time application. In this paper, an Energy Efficient Clustering Protocol is
proposed to reduce without compromising Network lifetime. The proposed protocol
is compared with the existing EECPL protocol. The performance metrics considered
for comparison are average end to end delay, the average energy consumption and
network lifetime. NS2 simulation tool is used for the implementation. The
proposed protocol outperforms the existing EECPL protocol. |
Keywords: |
Energy Efficient Clustering to Enhanced Lifetime protocol, Cluster Head, Data
aggregation, Cluster Member. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET |
Author: |
T.KARTHIKEYAN, DR.A.RAJARAM |
Abstract: |
Mobile Ad hoc Network (MANET) consists of mobile nodes. Nodes are connected
without any infrastructure. MANET ensures that lack of infrastructure, self
organization and no access point. Mobile nodes are sharing their data whenever
and wherever it’s needed. To maintain the effective data sharing, the data
replication technique is needed. The main aim of the research work is to develop
the data replication algorithm based on multicasting, data access method and
power consumption in order to provide the minimum power consumption and high
data availability rate in the network. Due to the presence of the network
partition, mobile nodes in one partition are not able to access the data hosted
by nodes in the other partition. So the performance of data access is degraded.
Existing methods aims at balancing trade-off between energy consumption, data
availability and delay. In proposed method we are focussing on balancing between
data accessibility, power consumption and data availability ratio. In first
phase, the multicast approach is proposed to achieve higher data availability.
In second phase, the data replication procedure is proposed to ensure the higher
data replication rate. In third phase, the data accessibility method ensures the
more data accessibility rate. In fourth phase the power consumption procedure to
ensure minimum transmission and reception power. By simulation results show that
the proposed scheme achieves better performance than the existing methods like
DAFN and OTOO. |
Keywords: |
MANET, Power Consumption, Data Accessibility, End To End Delay, Overhead,
Network Lifetime, Network Partition And Data Replication Procedure. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT POSITION BASED PACKET FORWARDING PROTOCOL FOR WIRELESS SENSOR NETWORKS |
Author: |
B.ANITHA, DR.A.RAJARAM |
Abstract: |
In Wireless Sensor Networks, sensor nodes are controlled by either base station
or without bases station. In our scheme, the sensor nodes are not depends on the
base station. Once the sensor node sent a packet to the destination node, the
residual energy is calculated through the multipath routing approach. In this
research work, an Efficient Position based Packet Forwarding Protocol (EPPFP) to
increase packet delivery rate based on the position of sensor nodes. It consists
of three phases. In first phase, multipath routing is implemented based on link
with high packet forwarding capacity. In second phase, packet forwarding scheme
is implemented to achieve high packet delivery rate and to schedule the packet
transmissions to multiple packet forwarders. In third phase, packet forwarding
verification is proposed to verify whether or not packets are successfully
forwarded. Based on simulation results, the proposed EPPFP achieves high
delivery ratio, increased network lifetime, less delay, minimum overhead and
energy consumption in terms of mobility, time and number of nodes than existing
schemes namely. |
Keywords: |
Packet forwarding, Packet verification, Network lifetime, End to End delay,
Mobility, Communication Overhead, Energy Consumption, Packet Delivery ratio and
pause time. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
REMOVAL OF DIFFERENT TYPES OF ARTIFACTS AND IMPULSE NOISE IN GRAY SCALE IMAGES |
Author: |
S.SURESH KUMAR, DR. H. MANGALAM |
Abstract: |
An adaptive based artifacts removal algorithm is proposed for removal of
blocking artifacts, strip lines, drop lines, blotches and impulses in images.
The algorithm detects noise variance level and then proper method is selected
depending upon the variance. The algorithm changes the maximum size of window
during the filtering operation depending on noise level. The output of the
filter is a particular value which replaces the current pixel value at that
point on which the value is centered at that time. Thus window size is
automatically modified based on the density of noise in the image. It replaces a
number of independent algorithms required for removal of blocking and other
different artifacts and gives better result. The performance of the algorithm is
evaluated in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR),
Correlation, Feature Similarity (FSIM), Mean Structural Similarity (MSSIM) and
Visual signal-to-noise ratio (VSNR). The computation time is compared with other
algorithms that already exist. |
Keywords: |
Strip Lines, Blotches, Blocking Artifacts, Noise Variance, Adaptive Based
Artifact Removal Algorithm, Feature Similarity. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
DETERMINING SOFTWARE MAINTAINABILITY OF JAVA INTERFACES USING QUANTITATIVE
APPROACH |
Author: |
N.BASKAR, A.V.RAMANI |
Abstract: |
Software maintainability is one important aspect in the evolution of a software
product. Several coupling measures have been introduced to identify and measure
the design complexity of an object oriented (OO) systems. The coupling metrics
proposed in this paper recognizes the complexity between inheritance and
interface programming. This paper presents measurements of Coupling between
Object (CBO) in object oriented programming. The metric values of class and
interface inheritance diagrams have been compared to prove whether
maintainability is improved to use and beneficial for the software developers. |
Keywords: |
Software Maintainability, Software Metrics, Object Oriented Systems, Interface,
Coupling, Java |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
PROPERTY BASED DYNAMIC SLICING OF OBJECT ORIENTED PROGRAMS |
Author: |
SANTOSH KUMAR PANI, G.B.MUND |
Abstract: |
Slicing is the process of extracting the statements of a program affecting a
given computation.In contrast to static slices, Dynamic slices are smaller in
size as they extract statements for a given execution of a program and helps in
interactive applications like debugging and testing. From last three decades,
many algorithms have been designed to slice a program with respect to the syntax
of the program. Traditional bulky Syntax based slices for program variables used
at many places in a program are generally large even for dynamic slices. Most of
the semantics based slicing algorithms extract slices by storing an execution
trace of a program. To the best of our knowledge generating dynamic slices based
on abstract/concrete properties of program variables is scarcely reported in
literature. We present here an algorithm for generating dynamic syntax based as
well as property slices of object oriented programs addressing all key object
oriented features. |
Keywords: |
Dynamic slice, ReferenceSet, Property based Slice, Polymerphism, Abstract state. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND
OPTICAL FLOW |
Author: |
SIVAGAMI.M , REVATHI.T , JEGANATHAN.L |
Abstract: |
This paper address the problem of extracting the foreground objects.We proposed
a novel technique for foreground object extraction using Fuzzy-c-means with
Bit-plane slicing and optical flow. Modeling the background is a challenging
task in foreground extraction. Before modeling the adaptive background image,
the image is processed by Lab color model and Bit-plane slicing. Then the frame
is modeled as a background using Fuzzy C - means algorithm with threshold.The
foreground is extracted based on this model. The background model is updated at
regular intervals of time. At last, the optical flow is applied to the
foreground extracted image to eliminate the errors caused due to the movement of
background object such as tree leaves, etc. The videos are taken from the
weizmann dataset and examined for this method. This method yields better results
than the previous algorithms with respect to memory consumption and quality of
the extracted image. |
Keywords: |
Foreground extraction, Fuzzy C-Means, optical flow, GMM, K-means, Bit-Plane
Slicing. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
3D MODELING AND SIMULATION OF ALGAE FOR SIMULATOR VEHICLES AND UNDERWATER
ENVIRONMENT |
Author: |
DUDDY SOEGIARTO |
Abstract: |
Research in the field of modeling and simulation of underwater environment is to
study the behavior of the environment and biota in the form a unified function
and behavior in a marine ecosystem. Modeling and simulation in this study the
main objective is to support the manufacture of vehicle simulators and the
underwater environment by making the modeling and simulation of marine plants,
especially algae. Modeling and simulation is performed using the laws of physics
to simulate the motion behavior of marine algae as a result of the dynamics of
water in the form of hydrodynamics and thermodynamics, or both. In this
research, modeling is used to provide a descriptive overview of the structure of
the handle while the laws of physics-dynamics for dynamic simulation.
Implementation process modeling and simulation is done by using the method of
l-systems and OpenGL. Modeling and simulation using the method of L-system and
OpenGL in this study resulted in the visualization of structures and simulation
algae under the sea. |
Keywords: |
Modeling, Simulation, Algae, L-system, OpenGL |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
INTERACTIVE HIGH QUALITY VIDEO STREAMING VIA COEQUAL SUPPORT VIDEO TRANSCODER |
Author: |
S.VETRIVEL, DR. G. ATHISHA |
Abstract: |
The most challenging problem in video transcoding is to determine the spatial
resolution, given a target bit rate. The spatial resolution (i.e., frame size),
chronological resolution (i.e., frame rate), and amplitude (i.e., SNR) are
classically excluded during the quantization step size (QS) to code the video.
In video streaming, similar video is regularly requested by receivers at
different sustainable receiving rates. Research works on Distortion-Quantization
(D-Q) and Distortion-Rate (D-R) model was developed to enhance the source model
using two-pass rate control method. D-Q and D-R model for H.264 variable bit
rate coding does not provide constant video quality provided with the target
rate constraint in practical video coding systems. On the other hand, the frame
rate and quantization on the bit rate (QBR) provided rate constraint efficiently
and effectively on both the sides of the encoder and decoder. The receiver
solves the problem related to rate-constrained SVC adaptation by assuming
spatial resolution with irregular perceptual video quality as output. To
maintain the quality of video in a constant manner, Coequal Support Video
Transcoding (CSVT) technique is developed. Coequal Support Video Transcoding
enables effective transcoding in overlay streaming with constant video quality.
First, CSVT leverages active co-equal cooperation without demanding
infrastructure support such as a transcoding server. Second, as transcoding is
computationally extreme with different types of devices used by participating
nodes with minimal computing power and related resources such as bandwidth, an
additional overlay called Meta-Video transcoding approach is also constructed in
CSVT. The Meta-Video transcoding approach in CSVT instantly share the
intermediate transcoding to minimize the total computing overhead .Experimental
results collected within a realistically simulated test bed measures the factors
such as video quality, PSNR rate, CPU overhead, processing time, bit rate and
transmission cost. |
Keywords: |
Video Transcoding, Infrastructure Support, Frame Rate, Quantization on Bit
Rate, Overlay Streaming, Distortion-Quantization, Metadata Overlay |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENHANCED KERBEROS AUTHENTICATION FOR DISTRIBUTED ENVIRONMENT |
Author: |
A. JESUDOSS , N.P. SUBRAMANIAM |
Abstract: |
This paper aims to provide a unique and enhanced authentication model based on
Kerberos environment. With this, it provides a hack-proof authentication system
and protects the Kerberos environment from password-guessing attack and replay
attack. Traditionally, the banking and financial institutions sends OTP to the
client mobile. When it is hacked, the identity can be compromised. Using the
proposed authentication model, even when the nonce value or the OTP is hacked,
the identity cannot be compromised. This paper insists the need for an
additional Session Key and a nonce to be used between the Authentication Server
(AS) and Client i.e. Alice. This helps to make the security stronger. Kerberos
environment is prone for replay attack and password-guessing attack and hence
this security model helps Kerberos environment to prevent such attacks. |
Keywords: |
Authentication, Kerberos, KDC, Secret key, Session Key, Replay Attack,
Password-Guessing Attack. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT RECLUSTERING ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR
NETWORKS |
Author: |
C.P. SUBHA , Dr. S.MALARKKAN |
Abstract: |
Wireless sensor networks are composed of a large number of sensor nodes with
limited energy resources. One critical issue in wireless sensor networks is how
to gather sensed information in an energy efficient way since the energy is
limited. The clustering algorithm is a technique used to reduce energy
consumption. It can improve the scalability and lifetime of wireless sensor
network. In this paper, we introduce an adaptive clustering protocol for
wireless sensor networks, which is called Adaptive Decentralized Re-Clustering
Heterogeneous Protocol (ADRHP) for Wireless Sensor Networks. In ADRHP, the
cluster heads and next heads are elected based on residual energy of each node
and the average energy of each cluster. Clustering has been well received as an
effective way to reduce the energy consumption of a wireless sensor network.
Clustering is defined as the process of choosing a set of wireless sensor nodes
to be cluster heads for a given wireless sensor network. Therefore, data traffic
generated at each sensor node can be sent via cluster heads to the base station.
We introduce ADRHP, for electing cluster heads and next heads in wireless sensor
networks. The selection of cluster heads and next heads are weighted by the
remaining energy of sensor nodes and the average energy of each cluster. ADRHP
is an adaptive clustering protocol; cluster heads rotate over time to balance
the energy dissipation of sensor nodes.The simulation results show that ADRHP
achieves longer lifetime and more data messages transmissions than current
neural network based clustering protocols in wireless sensor networks. |
Keywords: |
REBCS, ADRHP,RECLUSTERING. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
TRACKING PERFORMANCES OF A HOT AIR BLOWER SYSTEM USING DIFFERENT TYPES OF
CONTROLLERS |
Author: |
SITI FATIMAH SULAIMAN, KHAIRUDDIN OSMAN, MOHD FUA’AD RAHMAT, AMAR FAIZ ZAINAL
ABIDIN, ISMAIL MOHD KHAIRUDDIN |
Abstract: |
System modeling is an important task to develop a mathematical model that
describes the dynamics of a system. The scope for this work consists of modeling
and controller design for a particular system. A heating and ventilation model
is the system to be modeled and will be perturbed by pseudo random binary
sequences (PRBS) signal. Parametric approach using AutoRegressive with Exogenous
input (ARX) model structure will be used to estimate the mathematical model or
approximated model plant. In this work, the approximated plant model is
estimated using System Identification approach. Once the mathematical model is
obtained, several controllers such as Self-Tuning Pole Assignment controller,
Proportional-Integral-Derivative (PID) controller, and Generalized Minimum
Variance (GMV) controller are designed and simulated in MATLAB. Finally, a
comparative study based on simulation is analyzed and discussed in order to
identify which controller deliver better performance in terms of the system’s
tracking performances. It is found from a simulation done that a Self-Tuning
Pole Assignment Servo-Regulator controller with a small value of pole give a
best performance in term of its ability to eliminate error (%e_ss) and produce
zero percentage of overshoot (%OS), while GMV controller using PSO tuning method
offers a fast rise-time (T_r), settling time (T_s), and also its ability in
eliminating (%e_ss).
|
Keywords: |
Hot Air Blower System, System Modeling, System Identification, ARX Model,
Controllers |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NOVEL APPROACH TO ENHANCE THE QUALITY OF AOMDV ROUTING PROTOCOL FOR MOBILE AD
HOC NETWORKS |
Author: |
P.PERIYASAMY, E.KARTHIKEYAN |
Abstract: |
Since the AOMDV routing protocol selects multiple node disjoint paths based on
minimal hop count, the link failures and route breaks occurred in highly dynamic
ad hoc networks. For eliminating such problems, we proposed a novel link quality
based multipath routing protocol called Link Quality Based Multipath Routing (LQBMR)
protocol which is the extension of a well known AOMDV routing protocol. The
proposed protocol finds multiple link reliable paths using Path-Link Quality
Estimator (P-LQE) such as Cumulative Expected Transmission Count (CETX). The
LQBMR protocol uses only CETX instead of hop count as path metric for
determining more link reliable paths between any source and destination pair for
data transmission. We have evaluated the performance of LQBMR protocol using NS
2.34 and compared it with AOMDV routing protocol. The LQBMR protocol reduces the
routing overhead, packet loss ratio, normalized routing overhead and energy
consumption. It also increases the packet delivery ratio and throughput. From
the simulation results, it is found that the LQBMR protocol has performed better
than AOMDV routing protocol. |
Keywords: |
Mobile Ad Hoc Networks, Multipath Routing, Packet Delivery Ratio, Throughput,
Average End To End Delay, Normalized Routing Overhead, AOMDV And Link Quality
Estimator. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
ALGORITHMS FOR DATA ANALYSIS AND DETECTION OF CHANGES IN THE SECURITY LEVEL OF
DATA TRANSMISSION IN WIRELESS NETWORKS |
Author: |
D.M. MIKHAYLOV, A.V. ZUYKOV, M.I. FROIMSON, A.V. STARIKOVSKIY, S.M. KHARKOV |
Abstract: |
Personal mobile devices with growing functionality have become an integral part
of people`s life influencing complexity of modern mobile networks with
increasing number of users and base stations. Mobile phones and networks are not
sufficiently protected as conventional systems do not provide an effective means
for dealing with existing security problems. This paper addresses the issue of
data security transmitted in wireless networks. The main attention is paid to
detection of un-trusted base station primarily based on accessible
software-defined radio modules. Authors provide the description of data analysis
system for wireless networks comprising three modules: wireless cellular
connections quality and mobile device condition control module; wireless
connection authentication and security control module; wireless Wi-Fi
connections authentication module, as well as detection algorithm of untrusted
base stations. The article also provides the information about the experiments
carried out and points out shortcomings of the current version of the proposed
algorithms. The testing experiments and further improvements are underway to
increase the system quality. It is planned to pay attention to the eavesdropping
issue. |
Keywords: |
Data Security, Data Analysis, Untrusted Base Station Detection, Base Station,
Wireless Network. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
Title: |
SPATIO-TEMPORAL SEGMENTATION AND CLASSIFICATION ON AERIAL DATA |
Author: |
Mr.K.PRAGADEESWARAN , Dr.A.SUBRAMANI |
Abstract: |
Classification is one of the standard problems in data mining with a set of
training data. Each set has data points and being signified by a feature vector,
the significant task to be performed is to algorithmically build a model that
measures the class label of an unseen test attribute based on the attribute
feature vector. Adaptive Cluster Distance Bounding for High-Dimensional Indexing
based on separating hyper plane boundaries of Voronoi clusters develops
inter-dimensional correlations. Indexing real high-dimensional data sets focus
on the clustering paradigm for search and retrieval but overlapping occurs while
using the features of temporal and spatio-temporal data on aerial types of data.
The goal is to develop a method which segment the heterogeneous data points in a
significant manner, spatiotemporally localize instances of activities in a
sequence way and remove overlapping using the seeds. To start with, initially
the focal point is obtained by classifying the temporal data using the
Spatial-Temporal Segmentation Modeling (SSM) method. SSM then uses individual
feature as a seed in order to expand the spatiotemporal specificity on aerial
data. SSM ensembles by sampling individual features as seeds by subsequently
taking into account their nearest neighbors and further segments heterogeneity
data points correspondences according to the coherence value. Finally, the
points having significant degree of overlap is discarded that overlap with the
temporal and spatio-temporal data. With this lenses dataset extracted from UCI
repository, SSM compute the features that are related to spatiotemporal
configuration between the training and test sets. Experiments conducted prove
the effectiveness of the method and it further shows that the proposed spatio-temporal
segmentation algorithm leverages the classification pattern to reduce the
average execution time by increasing the micro averaged accuracy efficiently and
effectively. |
Keywords: |
Spatial-Temporal Segmentation Modeling, Classification, Nearest Neighbor,
Heterogeneity Data Points, Degree of overlap, Coherence. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2014 -- Vol. 69. No. 2 -- 2014 |
Full
Text |
|
|
|